Tue.Mar 18, 2025

article thumbnail

Amazon disables option to store Echo voice recordings on your device

Malwarebytes

Amazon has announced its Echo devices will no longer have the option to store and process requests on the device itself, meaning your voice recordings will now be sent to the cloud for processing. In an email sent to customers, Amazon explained that the feature “Do Not Send Voice Recordings” will no longer be available beginning March 28, 2025.

Internet 143
article thumbnail

News alert: SquareX’s “Year of Browser Bugs” project exposes critical cybersecurity blind spots

The Last Watchdog

Palo Alto, Calif., Mar. 18, 2025, CyberNewswire — SquareX , a pioneer in Browser Detection and Response (BDR) space, announced the launch of the “Year of Browser Bugs” (YOBB) project today, a year-long initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors – the browser.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS/FortiProxyand GitHub Actionflaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2025-24472 Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability CVE-2025-30066 tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability In Fe

article thumbnail

My Take: Here’s why Google’s $32B Wiz grab is the latest Big Tech leap sure to further erode privacy

The Last Watchdog

Weve seen this movie before. Alphabet, Googles parent company’s, $32 billion bid for Wiz isnt just about security and privacy. Its the latest round in Big Techs long-running game of business leapfrogwhere each giant keeps lunging into the next guys home turf, trying to reshape the battlefield in its favor. Think about it. Google tried to unseat Microsoft Office with Google Apps.

CISO 130
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

ChatGPT SSRF bug quickly becomes a favorite attack vector

Security Affairs

Threat actors exploit a server-side request forgery (SSRF) flaw, tracked as CVE-2024-27564, in ChatGPT, to target US financial and government organizations. Cybersecurity firm Veriti reports that threat actors are exploiting a server-side request forgery (SSRF) vulnerability, tracked as CVE-2024-27564 (CVSS score of 6.5), in ChatGPT to target financial and government organizations in the US.

article thumbnail

AMOS and Lumma stealers actively spread to Reddit users

Malwarebytes

We were alerted to Mac and Windows stealers currently distributed via Reddit posts targeting users engaging in cryptocurrency trading. One of the common lures is a cracked software version of the popular trading platform TradingView. The crooks are posting links to both Windows and Mac installers which have been laced with Lumma Stealer and Atomic Stealer (AMOS) respectively.

LifeWorks

More Trending

article thumbnail

The Future of Enterprise Security: AI-powered Lateral Defense in a Dynamic Threat Landscape

Security Boulevard

Attackers increasingly leverage AI-powered exploitation and can quickly identify vulnerable systems, infiltrate networks unnoticed and move laterally to compromise critical assets. The post The Future of Enterprise Security: AI-powered Lateral Defense in a Dynamic Threat Landscape appeared first on Security Boulevard.

article thumbnail

Road Tolls Scams Rise on FBI's Radar; Public Warned Against Smishing

SecureWorld News

In recent months, a sophisticated scam has emerged, targeting drivers across the United States with fraudulent text messages about unpaid road tolls. These "smishing" scamsphishing attempts conducted via SMSaim to deceive recipients into divulging personal and financial information. The FBI, along with state authorities and cybersecurity experts, have issued warnings to the public to remain vigilant against these deceptive tactics.

Scams 75
article thumbnail

Nation-state actors and cybercrime gangs abuse malicious.lnk files for espionage and data theft

Security Affairs

11 state-sponsored APTs exploit malicious.lnk files for espionage and data theft, with ZDI uncovering 1,000 such files used in attacks. At least 11 state-sponsored threat groups have been abusing Windows shortcut files for espionage and data theft, according to an analysis by Trend Micros Zero Day Initiative (ZDI). Trend ZDI researchers discovered 1,000 malicious.lnk files used by nation-state actors and cybercrime groups to execute hidden malicious commands on a victims machine by exploiting th

article thumbnail

Prompt Security Adds Ability to Restrict Access to Data Generated by LLMs

Security Boulevard

Prompt Security today extended its platform to enable organizations to implement policies that restrict the types of data surfaced by a large language model (LLM) that employees are allowed to access. The post Prompt Security Adds Ability to Restrict Access to Data Generated by LLMs appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Silk Typhoon: Unmasking the Cyber Espionage Threat Targeting the U.S. Supply Chain

Approachable Cyber Threats

Category News, Vulnerabilities Risk Level Hackers are setting their sights on the IT supply chain, and your data is the prize. Meet Silk Typhoonthe latest cyber threat you need to know about. If youre part of the US IT supply chain, you know theres no shortage of malicious actors trying to break into your networks and steal your proprietary information.

article thumbnail

“My Vas Pokhoronim!”

Security Boulevard

CISA, in collaboration with the FBI and NSA, identified and attributed multiple attacks to Russian entities, emphasizing the risks posed by state-backed Advanced Persistent Threats (APTs). The post “My Vas Pokhoronim!” appeared first on Security Boulevard.

Risk 80
article thumbnail

Thales OneWelcome Identity Platform and HIPAA Compliance in 2025

Thales Cloud Protection & Licensing

Thales OneWelcome Identity Platform and HIPAA Compliance in 2025 madhav Wed, 03/19/2025 - 05:58 The Health Insurance Portability and Accountability Act (HIPAA) has undergone significant changes in 2025, introducing enhanced requirements to address growing cyber threats and ensure comprehensive data protection. The Thales OneWelcome Identity Platform is fully HIPAA compliant, offering robust Customer Identity and Access Management (CIAM) solutions tailored to meet these updated regulations.

article thumbnail

GitHub Action tj-actions/changed-files was compromised in supply chain attack

Security Affairs

The GitHub Action tj-actions/changed-files was compromised, enabling attackers to extract secrets from repositories using the CI/CD workflow. Researchers reported that threat actors compromised the GitHub Action tj-actions/changed-files , allowing the leak of secrets from repositories using the continuous integration and continuous delivery CI/CD workflow.

Hacking 58
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Alphabet’s $32B Wiz Acquisition Boosts Cloud Security

eSecurity Planet

In a landmark move set to reshape the cybersecurity landscape, Alphabet, the parent company of Google, has agreed to acquire Israeli cybersecurity startup Wiz in a deal valued at approximately $32 billion. The acquisition, which underscores Alphabets ambition to strengthen its cloud security offerings, marks one of the largest investments in cybersecurity to date.

article thumbnail

Google Acquires Startup Wiz for $32B to Make ‘Cybersecurity More Accessible And Simpler’

Tech Republic Security

Googles agreement to buy cloud security startup Wiz will face antitrust scrutiny amid Alphabets ongoing legal battles.

article thumbnail

Tech Show London: Making Dating Scams Less Attractive

IT Security Guru

Technology has transformed so many areas of our lives and relatively quickly in the grand scheme of things. From tech used to make education more accessible, for example, to the ever talked about artificial intelligence (AI) shaping many sectors, the way tech has integrated with the modern world both seamlessly and speedily is notable. One area where technology has reshaped experience is online dating.

Scams 57
article thumbnail

What is Infrastructure Intelligence?

Security Boulevard

Cyber threats are growing in sophistication, and adversaries are continually evolving their methods, targeting businesses, governments, and individuals with precision. For network defenders and fraud prevention teams, understanding this evolving landscape is critical to preempt attacks, mitigate risks, and protect key assets. But how do you stay ahead of these relentless attackers?

DNS 59
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-27564: Attackers Exploit OpenAI Vulnerability in the Wild

Penetration Testing

A newly disclosed server-side request forgery (SSRF) vulnerability, tracked as CVE-2024-27564, has become a significant target for cybercriminals, The post CVE-2024-27564: Attackers Exploit OpenAI Vulnerability in the Wild appeared first on Cybersecurity News.

article thumbnail

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

The Hacker News

Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious actors to take control of susceptible systems.

article thumbnail

How to Take Control of Your Online Presence

Security Through Education

Many of us dont realize just how much we share about ourselves on the internet. Social media provides us with a fast, efficient, and exciting way to share our interests and experiences with our friends, but who outside of our sphere REALLY needs to know all this information about us? The internet never forgetsold accounts, personal information, and forgotten posts can linger for years.

article thumbnail

You have 4 days to update Firefox before everything breaks

Zero Day

This upgrade isn't optional.

132
132
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

The Hacker News

An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017.

132
132
article thumbnail

Transforming Security Operations With Generative AI 

Security Boulevard

Organizations that adopt these AI-driven strategies will not only improve the accuracy and efficiency of their threat detection but also gain a competitive edge by making smarter, faster decisions in every aspect of their operations. The post Transforming Security Operations With Generative AI appeared first on Security Boulevard.

article thumbnail

How a researcher with no malware-coding skills tricked AI into creating Chrome infostealers

Zero Day

Anyone can become a zero-knowledge threat actor now, thanks to AI.

Malware 126
article thumbnail

Breaking Down Risks in Cybersecurity

Security Boulevard

Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity A great conversation on the Cyber Crime Junkies podcast with David Mauro! We covered so many different topics that the CISOs are struggling with: Generative vs Agentic AI risks and opportunities How cyber attackers leverage powerful tools like AI Why defenders are slower than attackers in using AI How attackers adapt with AI advantages Why the value of security is a blind spot The difficulty of cybe

Risk 52
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

The Hacker News

Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL.

Malware 124
article thumbnail

Finally, a Linux distro for power users with a refreshing approach to OS design

Zero Day

NixOS is a well-designed OS with a fantastic array of layouts and features, but I recommend it to Linux users who aren't afraid of a little learning curve.

118
118
article thumbnail

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

The Hacker News

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data.

Malware 124
article thumbnail

Kali Linux 2025.1a Release (2025 Theme, & Raspberry Pi)

Kali Linux

We are kicking off 2025 with Kali Linux 2025.1a ! This update builds on existing features, bringing enhancements and improvements to streamline your experience. It is now available to download or upgrade if you’re already running Kali Linux. Kali Linux 2025.1 a ? What happened to 2025.1? There was a last minute bug discovered in a package after already producing our images.

Firmware 118
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!